BlackCat is ransomware written in Rust that has been offered via the Ransomware-as-a-Service (RaaS) model. First observed November 2021, BlackCat has been used to target multiple sectors and organizations in various countries and regions in Africa, the Americas, Asia, Australia, and Europe.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
BlackCat can use |
|
| Enterprise | T1112 | 修改注册表 |
BlackCat has the ability to add the following registry key on compromised networks to maintain persistence: |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
BlackCat can execute commands on a compromised network with the use of |
| Enterprise | T1486 | 数据加密以实现影响 |
BlackCat has the ability to encrypt Windows devices, Linux devices, and VMWare instances.[1] |
|
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1222 | .001 | 文件和目录权限修改: Windows File and Directory Permissions Modification |
BlackCat can use Windows commands such as |
| Enterprise | T1489 | 服务停止 |
BlackCat has the ability to stop VM services on compromised networks.[1][2] |
|
| Enterprise | T1069 | .002 | 权限组发现: Domain Groups |
BlackCat can determine if a user on a compromised host has domain admin privileges.[1] |
| Enterprise | T1570 | 横向工具传输 |
BlackCat can replicate itself across connected servers via |
|
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control | |
| Enterprise | T1561 | .001 | 磁盘擦除: Disk Content Wipe |
BlackCat has the ability to wipe VM snapshots on compromised networks.[1][2] |
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
BlackCat can clear Windows event logs using |
| Enterprise | T1491 | .001 | 篡改: Internal Defacement |
BlackCat can change the desktop wallpaper on compromised hosts.[1][2] |
| Enterprise | T1082 | 系统信息发现 |
BlackCat can obtain the computer name and UUID, and enumerate local drives.[1] |
|
| Enterprise | T1490 | 系统恢复抑制 |
BlackCat can delete shadow copies using |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
BlackCat can utilize |
|
| Enterprise | T1135 | 网络共享发现 |
BlackCat has the ability to discover network shares on compromised networks.[1][2] |
|
| Enterprise | T1134 | 访问令牌操控 | ||
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
BlackCat can utilize |
| Enterprise | T1018 | 远程系统发现 |
BlackCat can broadcasts NetBIOS Name Service (NBNC) messages to search for servers connected to compromised networks.[1] |
|
| ID | Name | References |
|---|---|---|
| G1015 | Scattered Spider |
Scattered Spider has deployed BlackCat ransomware to victim environments for financial gain.[4][5] |